{"id":421,"date":"2022-10-03T19:58:44","date_gmt":"2022-10-03T19:58:44","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2022\/10\/03\/cybersecurity-awareness-month-2022-ieee-computer-society\/"},"modified":"2022-10-03T19:58:44","modified_gmt":"2022-10-03T19:58:44","slug":"cybersecurity-awareness-month-2022-ieee-computer-society","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2022\/10\/03\/cybersecurity-awareness-month-2022-ieee-computer-society\/","title":{"rendered":"Cybersecurity Awareness Month 2022 | IEEE Computer Society"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p>IEEE Computer Society Team<\/p>\n<\/p><\/div>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303581 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/10\/03184456\/cybersecurity-month-2022-250x250-1.jpg\" alt=\"2022 Cybersecurity Awareness Month\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/10\/03184456\/cybersecurity-month-2022-250x250-1.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/10\/03184456\/cybersecurity-month-2022-250x250-1-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/10\/03184456\/cybersecurity-month-2022-250x250-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>Every year, during Cybersecurity Awareness Month, we highlight the importance of security and privacy. With 52 million data breaches during the second quarter of this year, we not only wish to safeguard individuals and their data, but also keep cybersecurity professionals abreast of vulnerabilities and solutions.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The increasing number of cyberattacks has shown us data breaches can happen to any company, regardless of size and industry. According to Mimecast\u2019s State of Email Security 2022, three out of four organizations have been victims of a ransomware attack.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: 'Open Sans'; font-weight: 400; line-height: 1.7em; text-align: left;\">We\u2019ve compiled resources to help cybersecurity professionals join the fight through education, connection with security colleagues, and leadership at every stage of their careers.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: 'Open Sans'; font-weight: 400; line-height: 1.7em; text-align: left;\">Courses | Peer-Reviewed Research | Conferences | Technical Communities | Cybersecurity Articles<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"courses\" style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">IEEE Academy Courses<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">There are more than 700,000 job openings in cybersecurity in the United States, and it is estimated that there will be more than 3.5 million unfilled jobs globally by 2025.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">If you\u2019re looking to start a career in cybersecurity, or are already established in the field, we\u2019ve picked top course programs from IEEE that help professionals as you stay on top of the latest technologies and strategies in security.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Additionally, you can search for open positions for security practitioners and cybersecurity in academia\u00a0on the IEEE Computer Society Jobs Board.<\/p>\n<p>\u00a0<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Cybersecurity Tools for Today\u2019s Environment<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">This 11-hour program provides up-to-date information and techniques to protect enterprise networks from future threats. These courses are best for mid-level computer science professionals who want to augment their knowledge in the field of cybersecurity.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Topics covered include threat vectors in cloud services, penetration testing, network sniffing and encryption, and web servers and application security and footprinting.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Courses:<\/p>\n<p>\u00a0<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Hacking Your Company: Ethical Solutions to Defeat Cyberattacks<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">This 8-hour program teaches IT departments how to identify weak points in their company\u2019s cybersecurity.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">You\u2019ll learn about SQL attacks and evasions, the nature of malware, process enumeration, and how to use scanning, system hacking, and session high jacking.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Courses:<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"research\" style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Peer-Reviewed Roadmaps, Frameworks, and More<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The IEEE Computer Society Digital Library (CSDL) has over 840,000 peer-reviewed articles sharing methodologies, frameworks, and tools with practical applications in industry. We\u2019ve compiled a few popular articles on trending topics from conference proceedings and <i>IEEE Security and Privacy<\/i> Magazine. We encourage you to search cybersecurity topics to find solutions to your current challenges.<\/p>\n<p><strong>Ransomware<\/strong><\/p>\n<p><strong>Security as a service<\/strong><\/p>\n<p><strong>Phishing attacks<\/strong><\/p>\n<p><strong>Multifactor authentication<\/strong><\/p>\n<p><strong>IoT vulnerabilities<\/strong><\/p>\n<p>\u00a0<\/p>\n<h2 id=\"conferences\" style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Cybersecurity Technical Conferences<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Technical conferences are more than sharing the latest in cybersecurity research. They are an opportunity for security professionals to engage with a community of like-minded practitioners and share solutions to common challenges.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Here are seven conferences happening over the next three months focusing on all areas of security. Feel free to get a head start on next year and search cybersecurity conferences in 2023.<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">IEEE Secure Development Conference (SecDev), 18 \u2013 20 October 2022<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">IEEE Symposium on Visualization for Cyber Security (VIZSEC), 19 October 2022<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 28-30 October 2022<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">IEEE\/ACM First International Workshop on Cyber Security in High Performance Computing (S-HPC), 13-18 November 2022<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">International Conference on Advancements in Smart, Secure, and Intelligent Computing (ASSIC), 19-20 November 2022<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">IEEE\/ACM Symposium on Edge Computing (SEC), 5-8 December 2022<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">IEEE 4th International Conference on Trust, Privacy, and Security in Intelligent Systems, and Applications (TPS-ISA), 14-17 December 2022<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2 id=\"communities\" style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Technical Communities<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">If you are a CISO, manager, or lead researcher, IEEE Computer Society Technical Communities are an opportunity for you to lend your expertise and leadership to drive conferences, knowledge sharing, and mentorship of upcoming leaders.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Security permeates every field of computing, and one entry point into technical communities is the Technical Community on Security and Privacy (TCSP).<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">TCSP addresses multiple areas of security, including operating system security, data encryption, access control mechanisms, and database protection, as well as legislation, technology impact, and standards for digital security.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">TCSP publishes a bi-monthly newsletter, Cipher, and sponsors two annual technical conferences: IEEE Symposium on Security and Privacy and Computer Security Foundations Symposium.<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"articles\" style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Cybersecurity-Related Articles<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Tech News brings the latest news and insights on security, technology, and trends for computing professionals and cybersecurity enthusiasts.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">If you are a security practitioner with best practices and advice from your field of expertise, we welcome thought pieces that can be shared with the great security and computing communities. Learn more about contributing as a thought leader.<\/p>\n<\/p><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/cybersecurity-awareness-month-2022\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] IEEE Computer Society Team Every year, during Cybersecurity Awareness Month, we highlight the importance of security and privacy. With&hellip;<\/p>\n","protected":false},"author":1,"featured_media":422,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85,8,9,368,70,369,19,2],"tags":[],"class_list":["post-421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-build-your-career","category-cybersecurity","category-cybersecurity-awareness-month","category-data-breach","category-privacy","category-secdev","category-security","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=421"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/421\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/422"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}